HP-UX Workload Manager User's Guide
WLM quick start: the essentials for using WLM
Network operating environment
Chapter 266
Network operating environment
WLM’s network interfaces are designed to operate correctly to defend
against attacks in a moderate to high threat environment, such as a
DMZ. You may use network protections, such as firewalls, to provide an
additional level of defense and to give you additional time to react when
a security loophole is found.
NOTE As of A.03.01, WLM enables secure communications by default when you
start WLM using the /sbin/init.d/wlm script. (If you are upgrading WLM,
secure mode might not be the default. Ensure that the appropriate
secure mode variables in /etc/rc.config.d/wlm are set correctly. For more
information on these variables, see “Securing WLM communications” on
page 244.) You also must distribute security certificates to all systems or
partitions being managed by the same WLM global arbiter (wlmpard).
For more information on using security certificates and other tasks
necessary to enable secure communications, see wlmcert(1M). This
manpage is also available at the following Web site:
http://www.hp.com/go/wlm
The WLM wlmpard and wlmcomd daemons use the following port
numbers by default:
wlmpard 9691
wlmcomd 9692
Make sure these ports are kept open. To change these port numbers, see
wlmpard(1M) and wlmcomd(1M).